ACM Conference on Computer and Communications Security

CCS 2017 - Available Artifacts

The following 24th ACM Conference on Computer and Communications Security papers have artifacts available..

All Papers · List By Authors · Institutions

(Alphabetical by Paper Title)

5Gen-C: Multi-input Functional Encryption and Program Obfuscation for Arithmetic Circuits [Artifact]Brent Carmer, Alex J. Malozemoff, Mariana Raykova
A Comprehensive Symbolic Analysis of TLS 1.3 [Paper] [Artifact]Cas Cremers, Marko Horvat, Jonathan Hoyland, Sam Scott, Thyla van der Merwe
A Fast and Verified Software Stack for Secure Function Evaluation [Paper] [Artifact]José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, François Dupressoir, Benjamin Grégoire, Vincent Laporte, Vitor Pereira
A Formal Foundation for Secure Remote Execution of Enclaves [Paper] [Artifact]Pramod Subramanyan, Rohit Sinha, Ilia Lebedev, Srinivas Devadas, Sanjit Seshia
A Touch of Evil: High-Assurance Cryptographic Hardware from Untrusted Components [Artifact]Vasilios Mavroudis, Andrea Cerulli, Petr Svenda, Dan Cvrcek, Dusan Klinec, George Danezis
A Type System for Privacy Properties [Paper] [Artifact]Véronique Cortier, Niklas Grimm, Joseph Lallemand, Matteo Maffei
Authenticated Garbling and Efficient Maliciously Secure Two-Party Computation [Paper] [Artifact]Xiao Wang, Samuel Ranellucci, Jonathan Katz
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing [Paper] [Artifact]Changyu Dong, Yilei Wang, Amjad Aldweesh, Patrick McCorry, Aad van Moorsel
DIFUZE:Interface Aware Fuzzing for Kernel Drivers [Artifact]Jake Corina, Aravind Machiry, Christopher Salls, Yan Shoshitaishvili, Shuang Hao, Christopher Kruegel, Giovanni Vigna
DUPLO: Unifying Cut-and-Choose for Garbled Circuits [Paper] [Artifact]Vladimir Kolesnikov, Jesper Buus Nielsen, Mike Rosulek, Ni Trieu, Roberto Trifiletti
Deterministic Browser [Paper] [Artifact]Yinzhi Cao, Zhanhao Chen, Song Li, Shujiang Wu
Deterministic, Stash-Free Write-Only ORAM [Paper] [Artifact]Daniel S. Roche, Adam J. Aviv, Seung Geol Choi, Travis Mayberry
Directed Greybox Fuzzing [Paper] [Artifact]Marcel Böhme, Van-Thuan Pham, Manh-Dung Nguyen, Abhik Roychoudhury
FAME: Fast Attribute-based Message Encryption [Paper] [Artifact]Shashank Agrawal, Melissa Chase
Forward and Backward Private Searchable Encryption from Constrained Cryptographic Primitives [Paper] [Artifact]Raphael Bost, Brice Minaud, Olga Ohrimenko
FreeGuard: A Faster Secure Heap Allocator [Artifact]Sam Silvestro, Hongyu Liu, Corey Crosser, Zhiqiang Lin, Tongping Liu
Global-Scale Secure Multiparty Computation [Paper] [Artifact]Xiao Wang, Samuel Ranellucci, Jonathan Katz
HACL*: A Verified Modern Cryptographic Library [Paper] [Artifact]Jean-Karim Zinzindohoué and Karthikeyan Bhargavan, Jonathan Protzenko, Benjamin Beurdouche
Homomorphic Secret Sharing: Optimizations and Applications [Artifact]Elette Boyle, Geoffroy Couteau, Niv Gilboa, Yuval Ishai, Michele Orru
How Unique is Your .onion? An Analysis of the Fingerprintability of Tor Onion Services [Artifact]Rebekah Overdorf, Marc Juarez, Gunes Acar, Rachel Greenstadt, Claudia Diaz
IMF: Inferred Model-based Fuzzer [Artifact]HyungSeok Han, Sang Kil Cha
Jasmin: High-Assurance and High-Speed Cryptography [Artifact]José Bacelar Almeida, Manuel Barbosa, Gilles Barthe, Arthur Blot, Benjamin Grégoire, Vincent Laporte, Tiago Oliveira, Hugo Pacheco, Benedikt Schmidt, Pierre-Yves Strub
Keep me Updated: An Empirical Study of Third-Party Library Updatability on Android [Paper] [Artifact]Erik Derr, Sven Bugiel, Sascha Fahl, Yasemin Acar, Michael Backes
Malicious-Secure Private Set Intersection via Dual Execution [Paper] [Artifact]Peter Rindal, Mike Rosulek
Practical Graphs for Optimal Side-Channel Resistant Memory-Hard Functions [Paper] [Artifact]Joel Alwen, Jeremiah Blocki, Ben Harsha
Practical Multi-party Private Set Intersection from Symmetric-Key Techniques [Paper] [Artifact]Vladimir Kolesnikov, Naor Matania, Benny Pinkas, Mike Rosulek, Ni Trieu
Quantifying the Pressure of Legal Risks on Third-party Vulnerability Research [Paper] [Artifact]Alexander Gamero-Garrido, Stefan Savage, Kirill Levchenko, Alex C. Snoeren
Revive: Rebalancing Off-Blockchain Payment Networks [Artifact]Rami Khalil, Arthur Gervais
Rewriting History: Changing the Archived Web from the Present [Artifact]Ada Lerner, Tadayoshi Kohno, Franziska Roesner
S3ORAM: A Computation-Efficient and Constant Client Bandwidth Blowup ORAM with Shamir Secret Sharing [Paper] [Artifact]Thang Hoang, Ceyhun D. Ozkaptan, Attila A. Yavuz, Jorge Guajardo, Tam Nguyen
Scaling ORAM for Secure Computation [Paper] [Artifact]Jack Doerner, abhi shelat
Side-Channel Attacks on BLISS Lattice-Based Signatures: Exploiting Branch Tracing Against strongSwan and Electromagnetic Emanations in Microcontrollers [Paper] [Artifact]Thomas Espitau, Pierre-Alain Fouque, Benoït Gérard, Mehdi Tibouchi
Synthesis of Probabilistic Privacy Enforcement [Artifact]Martin Kucera, Petar Tsankov, Timon Gehr, Marco Guarnieri, Martin Vechev
The Dynamics of Innocent Flesh on the Bone: Code Reuse Ten Years Later [Paper] [Artifact]Victor van der Veen, Dennis Andriesse, Manolis Stamatogiannakis, Xi Chen, Herbert Bos, Cristiano Giuffrida
The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli [Artifact]Matus Nemec, Marek Sys, Petr Svenda, Dusan Klinec, Vashek Matyas
The TypTop System: Personalized Typo-tolerant Password Checking [Paper] [Artifact]Rahul Chatterjee, Joanne Woodage, Yuval Pnueli, Anusha Chowdhury, Thomas Ristenpart
Use Privacy in Data-Driven Systems: Theory and Experiments with Machine Learnt Programs [Paper] [Artifact]Anupam Datta, Matthew Fredrikson, Gihyuk Ko, Piotr Mardziel, Shayak Sen
Verified Correctness and Security of mbedTLS HMAC-DRBG [Paper] [Artifact]Katherine Q. Ye, Matthew Green, Naphat Sanguansin, Lennart Beringer, Adam Petcher, Andrew W. Appel
Verifying Security Policies in Multi-agent Workflows with Loops [Paper] [Artifact]Bernd Finkbeiner, Christian Müller, Helmut Seidl, Eugen Zalinescu
Zero-Knowledge Contingent Payments Revisited: Attacks and Payments for Services [Paper] [Artifact]Matteo Campanelli, Rosario Gennaro, Steven Goldfeder, Luca Nizzardo
walk2friends: Inferring Social Links from Mobility Profiles [Paper] [Artifact]Michael Backes, Mathias Humbert, Jun Pang, Yang Zhang